SAFER COMPUTING FOR RVers - PowerPoint PPT Presentation

1 / 29
About This Presentation
Title:

SAFER COMPUTING FOR RVers

Description:

because I use Norton, McAfee, etc to protect me. WRONG! See next (too ... (Internet Security Suite Norton, McAfee, etc) Easily defeated / turned off ... – PowerPoint PPT presentation

Number of Views:60
Avg rating:3.0/5.0
Slides: 30
Provided by: ANOt1
Category:
Tags: computing | for | safer | mcafee | rvers

less

Transcript and Presenter's Notes

Title: SAFER COMPUTING FOR RVers


1
SAFER COMPUTINGFOR RVers
  • YOUR PRESENT SECURITY SOFTWARE IS LEAVING YOU
    VULNERABLE AND MAKING YOUR COMPUTER SLOW!

2
OVERVIEWA LOT TO COVER IN A SHORT AMOUNT OF TIME
  • Internet threats and protection
  • The need to image
  • Special considerations for WIFI
  • Keep your data from prying eyes
  • What about Vista, IE7, future trends

3
I AM SAFE
  • since I dont open attachments
  • WRONG! This is only one way to get infected
    open ports, Java, JavaScript, ActiveX, driver and
    application attacks, downloads, HTML email, etc

4
I AM SAFE.
  • because I use Norton, McAfee, etc to protect me
  • WRONG! See next slide (too many reasons!)

5
ISS DRAWBACKS(Internet Security Suite Norton,
McAfee, etc)
  • Easily defeated / turned off
  • Little or no rootkit detection
  • Little or no protection against driver or
    application attacks
  • New attacks every day, mutating malware
    definition files cannot keep up / false
  • High overhead slows computer
  • No protection against future attacks, little
    protection against software attacks (Word, Excel,
    Adobe, Java, etc)

6
I AM SAFE
  • Because I use open source (OS) software and dont
    use MS
  • Although there is some truth in this, many
    vulnerabilities come from the same program
    modules that are used in the targeted programs,
    thus same vulnerability
  • Therefore, you must keep OS programs patched
    also

7
HOW DO YOU GET INFECTED
  • Being connected to internet 65k easy ways into
    your computer
  • HTML email also turn off image preview
  • Software download
  • Malicious websites Java, JS, Flash, jpg
  • Driver attacks
  • Software attacks Word, Excel, Adobe
  • Rootkits difficult/impossible to remove or
    detect
  • Future is even worse

8
COMPUTER INFECTIONS
  • MS reports that approx 80 that visit their
    Security Baseline Advisor site are seriously
    infected with malware
  • Since most of the visits are by corporate sites
    that usually take at least some measures to be
    safe, consumer computer infection rate is
    expected to be much higher.

9
MALWARE TRENDS
  • From Hacker to Professional
  • From fun (kids) to Profit (Mafia, gangs)
  • From self-replicating to Targeted (control)
  • From Static to Dynamic (control, defeat
    protection schemes)
  • Most modern malware will turn off your Internet
    Security Suite (IIS) rendering it useless

10
SAFE PRACTICES
  • Adjust browser setting so that Java, JavaScript
    ActiveX controls are disabled or enabled via
    whitelist (sites you approve)
  • NEVER open an email attachment
  • Keep OS and programs patched and drivers updated
    (big problem!)
  • Turn off HTML email

11
  • Dont download software from untrusted sites
    (Never from P2P)
  • NEVER click a link in an email
  • Certain AV AS for first line of defense
  • WE NEED A BETTER EASIER SOLUTION!

12
SIMPLER AND SAFER ALTERNATIVES
  • HOST INTRUSTION PROTECTION Monitors your
    computer and prevents most malware from running
  • VIRTUALIZATION
  • Allows programs to run in a protected area of
    memory. Turning off computer eliminates all
    traces of program activity

13
DEFENSEWALL
  • Combination HIPS virtual environment
  • Only program currently recommended. Many
    imitators, but they do not pass all the security
    tests.
  • Only for XP SP2 Vista
  • Costs 30
  • Only possible alternatives
  • Sandboxie - not as much protection
  • Comodo Firewall v3 untested, not avail yet

14
VIRTUALIZATION
  • Must also run good firewall (Comodo)
  • (Router is also a good firewall, but only
    protects inbound)
  • Takes up HD space
  • Eats memory (min 1GB XP, 2GB Vista)
  • Free alternatives
  • VMWare Player (www.vmware.com)
  • Moka5 (www.moka5.com)
  • Surf internet and read email from within virtual
    pc
  • DefenseWall is easier!

15
THE PAYOFF
  • Although it is still a good idea to keep your
    Windows and programs patched and drivers updated,
    you are likely to overlook something. Also,
    RVers dont often have a broadband internet
    connection necessary for these huge downloads.
  • The proper use of DefenseWall or Virtualization
    offers the safest alternative

16
BELTS SUSPENDERS
  • Best of the old style defense
  • Eset NOD32 AV program
  • Webroot Spyweeper or Tenebril Spycatcher
  • Custom HOSTS file or browser software to stop
    visits to known bad internet sites
  • The problem is that no AV/spyware program will
    catch everything and present/future malware may
    severely affect effectiveness
  • Little/no app protection

17
PHISHING
  • Phony website set up by crooks to con you into
    providing them your login, password, SS or other
    confidential data
  • Social engineering, usually by email
  • Phony site looks identical to real site,
    including the URL
  • Call to see if bogus, always type in URL
  • Beware of VISHING (Bogus call center)

18
PHARMING
  • Malware modifies your HOSTS file to send you to
    bogus website even when you type in the URL
  • Protect against HOSTS file modification by using
    a free program such as WinPatrol

19
  • DISK IMAGING

20
DISK IMAGING BENEFITS
  • Creates an exact copy of your HD
  • Reinstall Windows and all programs in less than
    20 minutes, ELIMINATE ALL MALWARE and FIX
    SOFTWARE PROBLEMS
  • Guard against hardware failure, software problems
    and glitches, viruses and rootkits
  • (Just make a clean image first!)
  • Dont waste time repairing Windows! If you cant
    fix in 15 minutes, reload your image!

21
DISK IMAGING SOFTWARE
  • Comes with many new external HDs
  • If you are purchasing disk image software,
    Acronis is recommended based on ease of use and
    capability
  • Can also be used for data backup
  • I cannot overemphasize the importance of disk
    imaging and data backup!

22
  • WIFI SECURITY

23
WIFI PRECAUTIONS
  • Avoid public hotspots such as Starbucks.
    Campgrounds are almost always safer
  • Most encryption (if any) used by public hotspots
    is weak and easily broken
  • Https connection is secure financial transactions
  • Any http connection is easily viewable
  • Email is a huge vulnerability only connect via
    https or your login and pw is viewable

24
  • PROTECT YOUR
  • DATA

25
PROTECT YOUR DATA PROTECT YOUR PRIVACY
  • What happens if you lose your computer?
  • Or your hard drive or thumb drive?
  • What if malware manages to break into your
    computer and steal your data?
  • What if someone snoops via WIFI?
  • Protect yourself easily and securely with
  • TRUECRYPT

26
TRUECRYPT
  • Free, Open source, virtually uncrackable security
    for an entire HD, partition, folder or file
  • Open source ensures no back door
  • Cant beat free!
  • Encrypt your data, upload to online storage or
    make DVD to keep offsite
  • DO NOT USE XP ENCRYPTION!
  • Or use other simpler file encryption programs
    (Google) Strength of encryption key is very impt!

27
ADDITIONAL STEPS
  • Store ALL of your impt info on a computer file
    (spreadsheet, image scans, etc). Credit cards,
    bank, finance, insurance.
  • medical info, etc on a DVD kept off site
  • Take pictures or video of all your belongings in
    case of robbery, fire or disaster
  • (Great info for your heirs also)
  • Use TRUECRYPT to keep this info safe from prying
    eyes!
  • Consider a program such as Laptop Lock
    (www.thelaptoplock.com)

28
FUTURE TRENDS
  • Vista
  • Recommend a new PC with 2GB RAM and Intel Core
    2 duo processor.
  • Best security features only work in 64bit
  • IE7
  • Protected mode (sandboxing) only in Vista
  • IE7 recommended settings changes on DOAI or SKP
    computerBOF YahooGroup

29
MORE INFO
  • This presentation and others are available on the
    DOAI website
  • And also at
  • http//www.dcc.byethost4.com
  • which also has a LOT of tutorials for beginners
Write a Comment
User Comments (0)
About PowerShow.com